McAfee advises on cyber-security
ITP.net
McAfee has revealed that one of the top priorities for companies planning to let staff use personal mobile devices on their network is creating an adequate policy document. By Georgina Enzer Published November 23, 2011 The top five essential points any ...

Four Ways to Invest in Cyber Security
Wealth Daily
To combat these threats, Defense officials are currently seeking more than $3.2 billion in cyber security funding in 2012 — nearly $1 billion more than the Department first reported in February. What's more, according to a new industry forecast, ...

Influencing Policy, If Not the Law
GovInfoSecurity.com
Jacob Olcott says Congress' failure to enact comprehensive cybersecuritylegislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy. "Look back over the past five or six years, a number of important things have ...

Embracing cyber security
CNET Asia (blog)
The Brunei Computer Emergency Response Team (BruCERT) is hosting a five-day Interative Technical Workshop on cyber security with the participation of security officers from all over the world. Participants will learn about different cyber incidents and ...

European smart grid cyber security through American eyes
Smart Grid News
This is from Pike Research security analyst Bob Lockhart, who had the pleasure of attending the recent European Smart Grid Cyber Security Forum in Amsterdam. Bob's been keeping a close eye on security standards forming and evolving in North America,...

Expert Says State Needs To Fix Cyber-Security Holes In Utilities
KUHF-FM
A local cyber-security expert is calling on the state to find out how many cities have essential utility and fuel delivery systems connected to the internet. This comes after Russian hackers used the internet to damage a pump at a water supply plant in ...

Technologist takes over as new DHS leader
FederalNewsRadio.com
Mark Weatherford recently stepped into the role of deputy under secretary for cybersecurity at the Department of Homeland Security. One cybersecurity expert proclaimed the move as the start of "an era of greater balance in national cybersecurity ...

We need a community of ethical hackers, says IT minister Kapil Sibal
Economic Times
Speaking at the curtain raiser of Third Global Cyber Security Summit in the capital, Sibal said that framing the rules for cyber security in the world will be imperative, as India looks to automate all public services. India is hosting the third global ...

NIST Aims to Define the Cyber Force
ExecutiveGov
... cybersecurity will continue to grow, and students need to have access to the necessary foundational education and other prerequisites needed to pursue them,” said Ernest McDuffie of NIST, lead manager for the National Initiative for Cyber Security ...

Facebook porn, animal-cruelty hacks spark parent concerns
Daily Caller
Facebook has launched new security features this year to improve cyber security and child online safety. Throughout October, also known as National Cyber SecurityAwareness Month, Facebook sponsored a series of panel discussions to addresscyber ...

Firms told to reconsider approach to data security
Experian QAS
According to Mark Dempster, associate of the Centre for Cyber Security, most companies with a security risk do not even realize they have a problem. Although firms often lose data, Mr Dempster continues, very few actually stop to consider exactly how ...

Companies 'are unaware they have a data security problem'
OneStopClick
The vast majority of companies are unaware they have a data security problem, according to the Centre for Cyber Security. Associate at the organisation Mark Dempster believes too many corporations lose data through phishing attacks without even ...

Illinois water plant not hacked by foreigners: US
msnbc.com
"My understanding is that the company had some pretty good logs (of traffic in its system) and our people got access to those logs," said a DHS cybersecurity official who spoke privately because he was not authorized to give interviews on the matter. ...

SEC cybersecurity guidance
Lexology (registration)
Furthermore, registrants may provide customers with payments and incentives to compensate for the inconvenience created by a cyber security breach. These should be accounted for in a manner consistent with Accounting Standards Codification 605-50. ...

IEEE GLOBECOM 2011 Expands Agenda Of New Industry Forum & Expo
RF Globalnet (press release)
... the agenda of its newly-introduced Industry Forum & Expo with several new industry technical presentations dedicated to the latest research in smart grid, cyber security, 4G wireless, aerospace power technology and radio system communications. ...

Senator Reid seeks to break cybersecurity legislation gridlock
Lexology (registration)
Despite a strong bipartisan consensus that the United States needs a federal cybersecurity law, partisan bickering has prevented any significant progress on the many versions of cybersecuritylegislation pending before Congress. ...

Win a free ticket to Black Hat Abu Dhabi 2011
Help Net Security
This year's Black Hat Abu Dhabi will bring the best in cyber security research and technical training to the middle East region; offering a deeper view into the increasingly complex threats presented to the technology industry today. ...

Virus Attacks on Computer
Press Information Bureau (press release)
The reply further stated that the government has circulated Computer Security Guidelines and Cyber Security Policy to all the Ministries/Department on taking steps to prevent, detect and mitigate cyber attacks. National Informatics Centre (NIC) ...

Kroes pushes for 'more muscular' EU digital security
ZDNet UK
For example, Enisa started operating a mobile assistance team from Athens in October offering local cybersecurity support to member states, she noted, and this work should carry on. Kroes did not divulge how much funding the Enisa plans would need. ...

Partner to Expand Cyber-Security Services and Offerings
ECNmag.com
Wind River, a world leader in embedded and mobile software, and Wurldtech Security Technologies, a leading provider of cyber-security testing and certification solutions for critical industries, announced that Wind River is the first operating system ...

SCADA Security Breaches Spark Industry Call to Action
Managing Automation Magazine
Last week, cyber-security expert Joe Weiss reported news of a SCADA system hack at a water utility in Springfield, IL, that burned out a water pump. According to Weiss—as well as subsequent reports from Wired and Network World, and a blog by Eric ...

Information Assurance Certification Scheme: Pilot Commences
Stock Markets Review
Improved IA skills, knowledge and professionalism are objectives of the National IA Strategy and theCyber Security Strategy. If you would like to be part of this new initiative, visit our website for further information and to register your interest. ...

Insight: Governors go where national politicians won't -- China
Reuters
The company has long been deemed a cyber-security risk and been blocked from other US deals. Yet that did not stop Virginia from successfully courting Huawei as well; the company opened an office in Reston, Virginia this year, roughly 15 miles west of ...

Cybersecurity expert hails new DHS cyber chief
By admin
New Department of Homeland Security Deputy Undersecretary for Cybersecurity Mark Weatherford's arrival could “herald an era of greater balance in national cybersecurity leadership” between DHS and the intelligence community, according ...
CrucialPointLLC

NCS 11/22/11 11/22 by nationalcybersecurity | Blog Talk Radio
By nationalcybersecurity
Top leaders from around the world are meeting this week to focus on cybersecurity. Delegates from around the world are in France to discuss the only international treaty dealing with cybercrime. Also listen to hear the job of the day! ...
Daily Cyber Security News

Xceedium Appoints John Suit Vice President of Product ...
By David Marshall
Suit brings more than 20 years of cyber security, software and security intelligence experience to the company. Suit will lead Xceedium's worldwide product management initiatives including further development of Xceedium Xsuite, the security ...
VMblog.com - Virtualization Technolog...

Manoj Joshi's blog: Is it possible to have a secure cyber universe ?
By manoj joshi
The goal was to reach out to the geek community to find a solution to a problem that seems to be on the top of many minds—cyber security. It was clear from the remarks of the leaders of the Pentagon's far-out research agency, that as of now ...
Manoj Joshi's blog